Installations
npm install serverless-prune-versions
Developer
manwaring
Developer Guide
Module System
CommonJS
Min. Node Version
Typescript Support
Yes
Node Version
14.17.0
NPM Version
6.14.13
Statistics
3 Stars
45 Commits
2 Watching
6 Branches
1 Contributors
Updated on 24 Sept 2023
Languages
TypeScript (98.81%)
JavaScript (0.91%)
Shell (0.28%)
Total Downloads
Cumulative downloads
Total Downloads
721,614
Last day
-1.5%
1,891
Compared to previous day
Last week
18.2%
11,265
Compared to previous week
Last month
16.9%
46,684
Compared to previous month
Last year
85.8%
426,892
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Serverless prune versions
Feedback appreciated! If you have an idea for how this library can be improved (or just a complaint/criticism) please open an issue.
Overview
This plugin for the Serverless Framework removes old versions of AWS Lambda functions - important because if left to it's own devices each time the Serverless Framework is used to update your Lambda or Lambda Layer code in AWS it creates a new version. But if you aren't using the old versions then no harm, no foul - right? Unfortunately not, because for each and every version that's created AWS Lambda stores the source code used by that version for you, and there's a hard limit of only 75GB available per account for storage of this source code. By removing old versions this plugin keeps you from hitting this storage limit, letting you worry about features instead of account limits.
Installation and setup
Install the plugin as a dev dependency in your project:
npm i serverless-prune-versions -D
or yarn add serverless-prune-versions -D
Add the plugin to the plugins
block of your serverless.yml
file:
1plugins: 2 - serverless-prune-versions
Configuration
Because this plugin will delete deployed versions of your Lambda functions it is disabled by default and you must explicitly enable it.
This plugin uses the following default configuration:
Property | Description | Default value |
---|---|---|
Automatic | Boolean, should plugin run automatically post-deployment | false |
Include Layers | Boolean, should plugin remove Lambda Layer versions in addition to Lambda versions | false |
Number | Numeric, how many versions to retain | 5 |
All properties can be changed by overriding values in the custom
block of your serverless.yml
. In this example the plugin will automatically run after every deployment and will remove all Lambda and Lambda Layer versions except for the 3 most recent.
1custom: 2 prune: 3 automatic: true 4 includeLayers: true 5 number: 3
This is the minimal configuration needed for the plugin to run automatically after every deployment - it will only remove Lambda versions (not Lambda Layer versions) and will retain the last 5 versions (since those defaults weren't overriden).
1custom: 2 prune: 3 automatic: true
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
Found 0/24 approved changesets -- score normalized to 0
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'main'
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
- Warn: 0 commits out of 6 are checked with a SAST tool
Reason
17 existing vulnerabilities detected
Details
- Warn: Project is vulnerable to: GHSA-67hx-6x53-jw92
- Warn: Project is vulnerable to: GHSA-93q8-gq69-wqmw
- Warn: Project is vulnerable to: GHSA-grv7-fg5c-xmjg
- Warn: Project is vulnerable to: GHSA-3xgq-45jj-v275
- Warn: Project is vulnerable to: GHSA-w573-4hg7-7wgq
- Warn: Project is vulnerable to: GHSA-9c47-m6qq-7p4h
- Warn: Project is vulnerable to: GHSA-29mw-wpgm-hmr9
- Warn: Project is vulnerable to: GHSA-35jh-r3h4-6jhm
- Warn: Project is vulnerable to: GHSA-952p-6rrq-rcjv
- Warn: Project is vulnerable to: GHSA-f8q6-p94x-37v3
- Warn: Project is vulnerable to: GHSA-xvch-5gv4-984h
- Warn: Project is vulnerable to: GHSA-r683-j2x4-v87g
- Warn: Project is vulnerable to: GHSA-c2qf-rxjj-qqgw
- Warn: Project is vulnerable to: GHSA-g4rg-993r-mgx7
- Warn: Project is vulnerable to: GHSA-72xf-g2v4-qvf3
- Warn: Project is vulnerable to: GHSA-j8xg-fqg3-53r7
- Warn: Project is vulnerable to: GHSA-3h5v-q93c-6h6q
Score
1.7
/10
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More